{"id":52837,"date":"2025-01-09T07:42:29","date_gmt":"2025-01-09T12:42:29","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=52837"},"modified":"2025-01-09T07:42:29","modified_gmt":"2025-01-09T12:42:29","slug":"ecovacs-robot-vacuums-hacked-in-real-life","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/ecovacs-robot-vacuums-hacked-in-real-life\/52837\/","title":{"rendered":"Ecovacs robot vacuums get hacked"},"content":{"rendered":"<p>Imagine: you get up in the night for a glass of water, walk across the unlit landing, when out of the darkness a voice starts yelling at you. Not nice, you\u2019d surely agree. But that\u2019s the new reality for owners of vulnerable robot vacuums, which can be commanded by hackers to turn from domestic servants into foul-mouthed louts. And that\u2019s not all: hackers can also control the robot remotely and access its live camera feed.<\/p>\n<p>The danger is clear and present: recently, cases of cyberhooligans hijacking vulnerable robot vacuums to prank people (and worse) have been seen in the wild. Read on for the details\u2026<\/p>\n<h2>How a robot vacuum works<\/h2>\n<p>Let\u2019s start with the fact that a modern robot vacuum is a full-fledged computer on wheels, usually running on Linux. It comes with a powerful multi-core ARM processor, a solid chunk of RAM, a capacious flash drive, Wi-Fi, and Bluetooth.<\/p>\n<div id=\"attachment_52845\" style=\"width: 2314px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/01\/09045456\/ecovacs-robot-vacuums-hacked-in-real-life-1.jpeg\"><img decoding=\"async\" aria-describedby=\"caption-attachment-52845\" class=\"size-full wp-image-52845\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/01\/09045456\/ecovacs-robot-vacuums-hacked-in-real-life-1.jpeg\" alt=\"Schematic of a typical robot vacuum \" width=\"2304\" height=\"1200\"><\/a><p id=\"caption-attachment-52845\" class=\"wp-caption-text\">Today\u2019s robot vacuum is a full-fledged computer on wheels <a href=\"https:\/\/media.defcon.org\/DEF%20CON%2032\/DEF%20CON%2032%20villages\/DEF%20CON%2032%20-%20Embedded%20Systems%20Village%20-%20Dennis%20Giese%20%26%20Braelynn%20Hacker%20-%20Reverse%20engineering%20and%20hacking%20Ecovacs%20robots.pdf\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>And of course, the modern robot vacuum has sensors everywhere: infrared, lidar, motion, camera (often several of each), and some models also have microphones for voice control.<\/p>\n<div id=\"attachment_52844\" style=\"width: 2554px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/01\/09045406\/ecovacs-robot-vacuums-hacked-in-real-life-2.jpeg\"><img decoding=\"async\" aria-describedby=\"caption-attachment-52844\" class=\"size-full wp-image-52844\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/01\/09045406\/ecovacs-robot-vacuums-hacked-in-real-life-2.jpeg\" alt=\"Camera and microphones in the Ecovacs DEEBOT X1 \" width=\"2544\" height=\"1262\"><\/a><p id=\"caption-attachment-52844\" class=\"wp-caption-text\">The Ecovacs DEEBOT X1 has not only a camera, but an array of microphones <a href=\"https:\/\/media.defcon.org\/DEF%20CON%2032\/DEF%20CON%2032%20villages\/DEF%20CON%2032%20-%20Embedded%20Systems%20Village%20-%20Dennis%20Giese%20%26%20Braelynn%20Hacker%20-%20Reverse%20engineering%20and%20hacking%20Ecovacs%20robots.pdf\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>And naturally, all modern robot vacuums are permanently online and hooked up to the vendor\u2019s cloud infrastructure. In most cases, they communicate aplenty with this cloud \u2014 uploading piles upon piles of data collected during operation.<\/p>\n<h2>Vulnerabilities in Ecovacs robot vacuums and lawn mowers<\/h2>\n<p>The first report of vulnerabilities in Ecovacs robot vacuums and lawnmowers surfaced in August 2024, when security researchers Dennis Giese (known for <a href=\"https:\/\/www.kaspersky.com\/blog\/xiaomi-mi-robot-hacked\/20632\/\" target=\"_blank\" rel=\"noopener nofollow\">hacking a Xiaomi robot vacuum<\/a>) and Braelynn Luedtke gave a talk at DEF\u00a0CON\u00a032 on <a href=\"https:\/\/www.youtube.com\/watch?v=_wUsM0Mlenc\" target=\"_blank\" rel=\"nofollow noopener\">reverse engineering and hacking Ecovacs robots<\/a>.<\/p>\n<div id=\"attachment_52843\" style=\"width: 2534px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/01\/09045314\/ecovacs-robot-vacuums-hacked-in-real-life-3.jpeg\"><img decoding=\"async\" aria-describedby=\"caption-attachment-52843\" class=\"size-full wp-image-52843\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/01\/09045314\/ecovacs-robot-vacuums-hacked-in-real-life-3.jpeg\" alt=\"Ecovacs GOAT G1 robot lawnmower \" width=\"2524\" height=\"1220\"><\/a><p id=\"caption-attachment-52843\" class=\"wp-caption-text\">The Ecovacs GOAT G1 can also be equipped with GPS, LTE and a long-range Bluetooth module <a href=\"https:\/\/media.defcon.org\/DEF%20CON%2032\/DEF%20CON%2032%20villages\/DEF%20CON%2032%20-%20Embedded%20Systems%20Village%20-%20Dennis%20Giese%20%26%20Braelynn%20Hacker%20-%20Reverse%20engineering%20and%20hacking%20Ecovacs%20robots.pdf\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>In their talk, Giese and Luedtke described several methods for hacking Ecovacs robot vacuums and the mobile app that owners use to control them. In particular, they found that a potential hacker could access the feed from the robot\u2019s built-in camera and microphone.<\/p>\n<p>This is possible for two reasons. First, if the app is used on an insecure network, attackers can intercept the authentication token and communicate with the robot. Second, although in theory the PIN code set by the device owner secures the video feed, in practice it gets verified on the app side \u2014 so it can be bypassed.<\/p>\n<div id=\"attachment_52842\" style=\"width: 2624px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/01\/09045158\/ecovacs-robot-vacuums-hacked-in-real-life-4.jpeg\"><img decoding=\"async\" aria-describedby=\"caption-attachment-52842\" class=\"size-full wp-image-52842\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/01\/09045158\/ecovacs-robot-vacuums-hacked-in-real-life-4.jpeg\" alt=\"Attackers accessing the video feed from an Ecovacs robot vacuum \" width=\"2614\" height=\"1232\"><\/a><p id=\"caption-attachment-52842\" class=\"wp-caption-text\">The PIN code for securing the video feed from an Ecovacs robot vacuum is verified on the app side, which makes the mechanism extremely vulnerable <a href=\"https:\/\/media.defcon.org\/DEF%20CON%2032\/DEF%20CON%2032%20villages\/DEF%20CON%2032%20-%20Embedded%20Systems%20Village%20-%20Dennis%20Giese%20%26%20Braelynn%20Hacker%20-%20Reverse%20engineering%20and%20hacking%20Ecovacs%20robots.pdf\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>The researchers also managed to gain root access to the robot\u2019s operating system. They found it was possible to send a malicious payload to the robot via Bluetooth, which in some Ecovacs models gets turned on after a scheduled reboot, while in others it\u2019s on all the time. In theory, encryption should protect against this, but Ecovacs uses a static key that\u2019s the same for all devices.<\/p>\n<p>Armed with this knowledge, an intruder can get root privileges in the operating system of any vulnerable Ecovacs robot and hack it at a distance of up to 50\u00a0meters (~165 feet)\u00a0\u2014 which is precisely what the researchers did. As for robot lawnmowers, these models are hackable at more than 100\u00a0meters (~330 feet) away, since they\u2019ve got more powerful Bluetooth capabilities.<\/p>\n<p>Add to that that, as mentioned already, today\u2019s robot vacuums are full-fledged Linux-based computers, and you can see how attackers can use one infected robot as a means to hack others nearby. In theory, hackers can even create a network-worm to automatically infect robots anywhere in the world.<\/p>\n<div id=\"attachment_52841\" style=\"width: 2542px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/01\/09044705\/ecovacs-robot-vacuums-hacked-in-real-life-5.jpeg\"><img decoding=\"async\" aria-describedby=\"caption-attachment-52841\" class=\"size-full wp-image-52841\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/01\/09044705\/ecovacs-robot-vacuums-hacked-in-real-life-5.jpeg\" alt=\"Bluetooth vulnerability could potentially be used to create a worm \" width=\"2532\" height=\"1212\"><\/a><p id=\"caption-attachment-52841\" class=\"wp-caption-text\">Bluetooth vulnerability in Ecovacs robots could lead to a chain of infection <a href=\"https:\/\/media.defcon.org\/DEF%20CON%2032\/DEF%20CON%2032%20villages\/DEF%20CON%2032%20-%20Embedded%20Systems%20Village%20-%20Dennis%20Giese%20%26%20Braelynn%20Hacker%20-%20Reverse%20engineering%20and%20hacking%20Ecovacs%20robots.pdf\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>Giese and Luedtke informed Ecovacs about the vulnerabilities they found, but received no response. The company did try to close some of the holes, say the researchers, but with little success and ignoring the most serious vulnerabilities.<\/p>\n<h2>How the Ecovacs robot vacuums were hacked for real<\/h2>\n<p>It appears that the DEF\u00a0CON talk generated great interest in the hacker community\u00a0\u2014 so much so that someone seems to have taken the attack a step further and deployed it on Ecovacs robot vacuums out in the real world. According to recent <a href=\"https:\/\/www.abc.net.au\/news\/2024-10-11\/robot-vacuum-yells-racial-slurs-at-family-after-being-hacked\/104445408\" target=\"_blank\" rel=\"nofollow noopener\">reports<\/a>, owners in several U.S. cities had been hit by hackers and made to suffer abuse from their robot servants.<\/p>\n<p>In one incident in Minnesota, an Ecovacs DEEBOT\u00a0X2 started moving by itself and making strange noises. Alarmed, its owner went into the Ecovacs app and saw that someone was accessing the video feed and remote-control feature. Writing it off as a software glitch, he changed the password, rebooted the robot and sat down on the couch to watch TV with his wife and son.<\/p>\n<p>But the robot kicked back into life almost straight away\u00a0\u2014 this time emitting a continuous stream of racial slurs from its speakers. Not knowing what to do, the owner turned off the robot, took it into the garage and left it there. Despite this ordeal, he is grateful that the hackers made their presence so obvious. Far worse, he says, would have been if they\u2019d simply secretly monitored his family through the robot without revealing themselves.<\/p>\n<div id=\"attachment_52839\" style=\"width: 872px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/01\/09044430\/ecovacs-robot-vacuums-hacked-in-real-life-6.jpeg\"><img decoding=\"async\" aria-describedby=\"caption-attachment-52839\" class=\"size-full wp-image-52839\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/01\/09044430\/ecovacs-robot-vacuums-hacked-in-real-life-6.jpeg\" alt=\" Video feed from an Ecovacs robot vacuum \" width=\"862\" height=\"485\"><\/a><p id=\"caption-attachment-52839\" class=\"wp-caption-text\">Hijacking a live video feed of an Ecovacs robot vacuum <a href=\"https:\/\/www.abc.net.au\/news\/2024-10-11\/robot-vacuum-yells-racial-slurs-at-family-after-being-hacked\/104445408\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>In a similar case, this time in California, another Ecovacs DEEBOT\u00a0X2 chased a dog around the house, again shouting obscenities. And a third case was reported from Texas, where, you guessed it, an Ecovacs robot vacuum went walkabout and hurled abuse at its owners.<\/p>\n<p>The exact number of hacks of Ecovacs robot vacuums is unknown. One reason for this, alluded to above, is that the owners may not be aware of it: the hackers may be quietly observing their daily lives through the built-in camera.<\/p>\n<h2>How to guard against robot vacuum hacking?<\/h2>\n<p>The short answer is: you can\u2019t. Unfortunately, there\u2019s no universal method of protecting against robot vacuum hacking that covers all bases. For some models, in theory, there\u2019s the option of hacking it yourself, getting root access, and unlinking the machine from the vendor\u2019s cloud. But this is a complex and time-consuming procedure that the average owner won\u2019t consider attempting.<\/p>\n<p>A serious problem with IoT devices is that many vendors, sadly, still pay insufficient attention to security. And they often prefer to bury their heads in the sand \u2014 even declining to respond to researchers who helpfully report such issues.<\/p>\n<p>To reduce the risks, try do your own research on the security practices of the vendor in question before purchasing. Some actually do a pretty good job of keeping their products safe. And, of course, always install firmware updates: new versions usually remove at least some of the vulnerabilities that hackers can exploit to gain control over your robot.<\/p>\n<p>And remember that a robot connected to home Wi-Fi, if hacked, can become a launchpad for an attack on other devices connected to the same network \u2014 smartphones, computers, smart TVs, and so on. So it\u2019s always a good idea to move IoT devices (in particular, robot vacuums) to a guest network, and install <a href=\"https:\/\/www.kaspersky.com\/premium?icid=gl_bb2023-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener nofollow\">reliable protection<\/a> on all devices where possible.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-geek\">\n","protected":false},"excerpt":{"rendered":"<p>Unknown hackers are exploiting newly discovered vulnerabilities in Ecovacs robot vacuums to spy on their owners and rain misery upon them.<\/p>\n","protected":false},"author":2706,"featured_media":52847,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1789,2683],"tags":[1027,771,82,658,794,1066,97,422,268],"class_list":{"0":"post-52837","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-technology","8":"category-threats","9":"tag-connected-devices","10":"tag-def-con","11":"tag-hacking","12":"tag-internet-of-things","13":"tag-iot","14":"tag-robots","15":"tag-security-2","16":"tag-threats","17":"tag-vulnerabilities"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/ecovacs-robot-vacuums-hacked-in-real-life\/52837\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/ecovacs-robot-vacuums-hacked-in-real-life\/28427\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/ecovacs-robot-vacuums-hacked-in-real-life\/23686\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/ecovacs-robot-vacuums-hacked-in-real-life\/28559\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/ecovacs-robot-vacuums-hacked-in-real-life\/27872\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/ecovacs-robot-vacuums-hacked-in-real-life\/30668\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/ecovacs-robot-vacuums-hacked-in-real-life\/29375\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/ecovacs-robot-vacuums-hacked-in-real-life\/38869\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/ecovacs-robot-vacuums-hacked-in-real-life\/13059\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/ecovacs-robot-vacuums-hacked-in-real-life\/22471\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/robos-aspiradores-da-marca-ecovacs-sao-hackeados\/23257\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/ecovacs-robot-vacuums-hacked-in-real-life\/31832\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/ecovacs-robot-vacuums-hacked-in-real-life\/37429\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/ecovacs-robot-vacuums-hacked-in-real-life\/28687\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/ecovacs-robot-vacuums-hacked-in-real-life\/34514\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/ecovacs-robot-vacuums-hacked-in-real-life\/34139\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/def-con\/","name":"DEF CON"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/52837","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2706"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=52837"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/52837\/revisions"}],"predecessor-version":[{"id":52840,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/52837\/revisions\/52840"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/52847"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=52837"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=52837"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=52837"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}